Tutorial: Security of quantum key distribution: approach from - - PowerPoint PPT Presentation

β–Ά
tutorial security of quantum key distribution approach
SMART_READER_LITE
LIVE PREVIEW

Tutorial: Security of quantum key distribution: approach from - - PowerPoint PPT Presentation

QCrypt2020: Aug. 12, 2020 Tutorial: Security of quantum key distribution: approach from complementarity Univ. of Tokyo Masato Koashi Quantum key distribution (QKD) Public communication Weak light pulses signals measurement Eve tests Bob


slide-1
SLIDE 1

Tutorial: Security of quantum key distribution: approach from complementarity

QCrypt2020: Aug. 12, 2020

  • Univ. of Tokyo Masato Koashi
slide-2
SLIDE 2

0100101 0100111 Sifted key 0100101 0100101 ??0?1?? 0101 0101 ????

Quantum key distribution (QKD)

Estimating the amount of leak from observed test data Alice Bob Eve Shortening the key to remove the leaked portion Sifted key Final key Final key

Weak light pulses

Privacy amplification

Public communication

measurement

signals tests

Error correction

Optical channel

slide-3
SLIDE 3

Explain how we can prove the security of QKD protocols against general attacks, focusing on the approach with β€œphase errors,”

Aim of this tutorial

which dates back to Mayers, Shor and Preskill. PART I: Methodology PART II: Protocols

Step 1: Perfect world (Basic idea) Step 2: Almost perfect world (Composable security) Step 3: Practical world (Privacy amplification) BB84 B92 TF-QKD RRDPS DM-CV QKD

slide-4
SLIDE 4

STEP 1: Perfect world

slide-5
SLIDE 5

𝑨 0101 𝑨′ 0101

Goal of QKD

Alice Bob Eve Final key Final key

Ideal property of the final key

・Correlation-free ・Uniformly distributed ・Error-free 𝐿 bits 𝐿 bits Quantum description 𝜍

, π‘žπ‘¨, 𝑨 π‘¨βŸ©βŸ¨π‘¨

  • ,

βŠ— π‘¨β€²βŸ©βŸ¨π‘¨β€² βŠ— πœπ‘¨, 𝑨 𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— π‘¨βŸ©βŸ¨π‘¨ βŠ— 𝜍

General state: Ideal state: 𝜍 𝑨, 𝑨 𝜍 βˆ€π‘¨, 𝑨′ π‘ž 𝑨, 𝑨 0 whenever 𝑨 𝑨′ Quantum System E βˆ‘ π‘ž 𝑨, 𝑨 βˆ‘ π‘ž 𝑨, 𝑨

  • 2
slide-6
SLIDE 6

𝑨 0101 𝑨′ 0101

Dividing the requirement

Alice Bob Eve Final key Final key

Ideal property of the final key

・Correlation-free ・Uniformly distributed ・Error-free 𝐿 bits 𝐿 bits

𝜍

, π‘žπ‘¨ π‘¨βŸ©βŸ¨π‘¨

  • βŠ— πœπ‘¨

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

Property of 𝜍

,: Tr𝜍 ,

Ideal state: 𝜍 𝑨, 𝑨 𝜍 βˆ€π‘¨, 𝑨′ Prob 𝑨, 𝑨 0 whenever 𝑨 𝑨′ Quantum System E Secrecy (for Alice) 𝜍 𝑨 𝜍 βˆ€π‘¨ Correctness Prob 𝑨 2 General state: Overall security π‘ž 𝑨, 𝑨 0 whenever 𝑨 𝑨′ βˆ‘ π‘ž 𝑨, 𝑨 βˆ‘ π‘ž 𝑨, 𝑨

  • 2
slide-7
SLIDE 7

Starting point: Cases when it is obviously secure

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

|οΌ‹βŸ© |0⟩ |1⟩/ 2

1

X basis eigenstate (a pure state) Z basis measurement ・Correlation-free ・Uniformly distributed If system A is in a pure state, it has no correlation to another system. If system A has non-zero correlation to another system, it is in a mixed state.

contrapositive H/V polarization Circularly polarized photon 1/2-Spin particle pointing (+x) direction A single photon fed to one input port Output ports of a half beam splitter Z component of spin

In what situation are we sure of achieving the ideal state?

slide-8
SLIDE 8

Starting point: Cases when it is obviously secure

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

|οΌ‹βŸ© |0⟩ |1⟩/ 2 ・Correlation-free ・Uniformly distributed

1 1

𝜍

,

Let us define the outcome β€˜0000000’ as β€˜success’. Any other outcome is a failure. In what situation are we sure of achieving the ideal state?

slide-9
SLIDE 9

Starting point: Cases when it is obviously secure

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

・Correlation-free ・Uniformly distributed

1 1

𝜍

,

Let us define the outcome β€˜0000000’ as β€˜success’. Any other outcome is a failure. ? ? ? ? ? If there is a promise that the failure probability is zero, 𝜍

, 𝜍 ,

In what situation are we sure of achieving the ideal state?

slide-10
SLIDE 10

So what?

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

|οΌ‹βŸ© |0⟩ |1⟩/ 2

1 1

𝜍

,

Bob: β€œWell, I’d be happy to see Alice’s key is secret, but the thing is, I don’t know her key either…” In what situation are we sure of achieving the ideal state? Alice: β€œI am a sender of optical pulses. I see no qubits in my transmitter.”

slide-11
SLIDE 11

Converting a sender to a receiver

Alice: β€œI am a sender of optical pulses. I see no qubits in my transmitter.” 1 Actual transmitter An entangled state

+

1 2 1 2

=

Probability 50% Probability 50%

A horizontally polaraized photon A vertically polarized photon

1 Equivalent Cases with a larger number of states, mixed states, and different probabilities are the same, except that the size of virtual quantum system may be larger. Then a qubit can be defined in a security proof.

slide-12
SLIDE 12

Freedom of Z rotation

1 1

𝜍

,

? ? ? ? ? If there is a promise that the failure probability is zero, 𝜍

, 𝜍 ,

1 1

𝜍

,

? ? ? ? ? Z axis rotations

Operations that commute with for every qubit

π‘Ž ≔ 0⟩⟨0 1⟩⟨1

β€œZ-preserving” operations

Bob: β€œWell, I’d be happy to see Alice’s key is secret, but the thing is, I don’t know her key either…”

slide-13
SLIDE 13

Freedom of Z rotation

1 1

𝜍

,

? ? ? ? ? If there is a promise that the failure probability is zero, 𝜍

, 𝜍 ,

Z axis rotations are freely allowed to decrease the failure probability. Bob: β€œWell, I’d be happy to see Alice’s key is secret, but the thing is, I don’t know her key either…”

slide-14
SLIDE 14

Entanglement

1 1

𝜍

,

= +

1 2 1 2

= +

1 2 1 2 Bob Bob

1 1 1 1

instruction Secrecy (for Alice) Correctness

slide-15
SLIDE 15

Security from complementarity

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is zero, 𝜍

, 𝜍 ,

Bob tries to help resetting Alice’s qubits to 0 on X basis

slide-16
SLIDE 16

Security from complementarity

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key Bob tries to help resetting Alice’s qubits to 0 on X basis

Classical channel

Both tasks are perfectly feasible 𝐿 ebits of entanglement

MK, arXiv:0704.3661

slide-17
SLIDE 17

Security from complementarity

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is zero, 𝜍

, 𝜍 ,

Bob tries to help resetting Alice’s qubits to 0 on X basis Aβ€²

Quantum channel β€œZ-preserving” operations

MK, New J. Phys., 11, 045018 (2009); MK, arXiv:0704.3661

slide-18
SLIDE 18

Security from complementarity

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key Bob tries to help resetting Alice’s qubits to 0 on X basis Erasing info on Alice’s final key Learning Alice’s final key Bob has a choice between a pair of mutually exclusive tasks

slide-19
SLIDE 19

STEP 2: Almost perfect world

slide-20
SLIDE 20

Small imperfection

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is πœ€, 𝜍

, is close to 𝜍 ,.

Bob tries to help resetting Alice’s qubits to 0 on X basis Aβ€² We want a theorem looking like

slide-21
SLIDE 21

Measure of imperfection

𝜍

, π‘žπ‘¨, 𝑨 π‘¨βŸ©βŸ¨π‘¨

  • ,

βŠ— π‘¨β€²βŸ©βŸ¨π‘¨β€² βŠ— πœπ‘¨, 𝑨 𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— π‘¨βŸ©βŸ¨π‘¨ βŠ— 𝜍

Actual state: Ideal state: Proper measure of closeness? A standard measure in QKD (Universal composable security) 1 2 𝜍

, 𝜍 ,

  • 𝐡 ≔ Tr

𝐡𝐡 ・Use of trace distance Monotonicity: 𝜍 𝜏 Ξ› 𝜍 Ξ› 𝜏

for any CPTP map Ξ›.

Triangle inequality: 𝜍 𝜏 𝜍 𝜐 𝜐 𝜏 ・Specification of 𝜍 𝜍 Tr 𝜍

, Tr 𝜍 , π‘žπ‘¨, 𝑨

  • ,

πœπ‘¨, 𝑨 ・Regard system E as β€˜everything’, not just an adversary’s system.

(As long as you are proving security against general attacks, you don’t have to worry about this difference.)

Ben-Or, M. Horodecki, Leung, Mayers, Oppenheim, in Proc. 2nd Theory Cryptogr. Conf., 3378, 386 (2005)

slide-22
SLIDE 22

Universal composable security

Actual QKD protocol 𝑨 𝑨′

Interaction with Quantum channel

𝐿

Key length Public Announcement Final key Final key

Ideal QKD protocol 𝑨′′ 𝑨′′

Interaction with Quantum channel

𝐿

Key length Public Announcement Final key Final key

Actual QKD protocol 𝑨 𝑨′ 𝑨′′ 𝑨′′

Ideal key Ideal key

slide-23
SLIDE 23

Actual protocol Ideal protocol State of the gray area: 𝜍 𝜍

The protocol is πœ—β€secure: It is guaranteed that

1 2 𝜍 𝜍

πœ—

For any event in the future, Monotonicity: 𝜍 𝜏 Ξ› 𝜍 Ξ› 𝜏

  • Prob π‘“π‘€π‘“π‘œπ‘’ actual Prob π‘“π‘€π‘“π‘œπ‘’ ideal

πœ—

Universal composable security

slide-24
SLIDE 24

State of the gray area: 𝜍 𝜍

,

  • 𝜍 𝜍

,

  • 𝜍

, π‘žπ‘¨, 𝑨 π‘¨βŸ©βŸ¨π‘¨

  • ,

βŠ— π‘¨β€²βŸ©βŸ¨π‘¨β€² βŠ— πœπ‘¨, 𝑨 2 π‘¨β€²β€²βŸ©βŸ¨π‘¨β€²β€²

  • βŠ— π‘¨βŸ©π‘¨

βŠ— π‘ž 𝑨, 𝑨

  • ,

𝜍 𝑨, 𝑨 𝜍

,

Actual protocol Ideal protocol 𝑨′ 𝑨 𝐿 𝐿 𝑨′′ 𝑨′′ Tr 𝜍

, Tr 𝜍 ,

Universal composable security

slide-25
SLIDE 25

State of the gray area: 𝜍 𝜍

,

  • 𝜍 𝜍

,

  • A QKD protocol is πœ—β€secure if

1 2 𝜍

, 𝜍 ,

  • πœ—
  • 1

2 𝜍

, 𝜍 ,

  • Actual protocol

Ideal protocol 𝑨′ 𝑨 𝐿 𝐿 𝑨′′ 𝑨′′

Universal composable security

slide-26
SLIDE 26

πœ—β€secure protocol πœ—β€²β€secure protocol πœ—β€secure protocol Ideal protocol 𝜍 ideal protocol Ideal protocol 𝜍 ?

Universal composable security

slide-27
SLIDE 27

πœ—β€secure protocol πœ—β€²β€secure protocol πœ—β€secure protocol Ideal protocol 𝜍 ideal protocol Ideal protocol 𝜍 ? πœ—β€²

Universal composable security

slide-28
SLIDE 28

πœ—β€secure protocol πœ—β€²β€secure protocol πœ—β€secure protocol Ideal protocol 𝜍 ideal protocol Ideal protocol 𝜍 ? πœ—β€² πœ—

Universal composable security

slide-29
SLIDE 29

πœ—β€secure protocol πœ—β€²β€secure protocol πœ—β€secure protocol Ideal protocol Triangle inequality: 𝜍 𝜏 𝜍 𝜐 𝜐 𝜏 𝜍 ideal protocol Ideal protocol 𝜍 1 2 𝜍 𝜍

πœ— πœ—β€²

πœ— πœ—β€² πœ—β€² πœ—

Universal composable security

slide-30
SLIDE 30

Dividing the requirement

Imperfection of the final key

Prob 𝑨 𝑨 πœ—β€²β€² Secrecy (for Alice) Correctness Overall security (πœ—β€secure) 1 2 𝜍

, 𝜍 ,

  • πœ—

1 2 𝜍

, 𝜍 ,

  • πœ—β€² (πœ—β€²β€secret)

(πœ—β€²β€²β€correct) With πœ— πœ—β€™+ πœ—β€™β€™

𝜍

, π‘žπ‘¨ π‘¨βŸ©βŸ¨π‘¨

  • βŠ— πœπ‘¨

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— 𝜍

𝜍

, 2 π‘¨βŸ©βŸ¨π‘¨

  • βŠ— π‘¨βŸ©βŸ¨π‘¨ βŠ— 𝜍

𝜍

, π‘žπ‘¨, 𝑨 π‘¨βŸ©βŸ¨π‘¨

  • ,

βŠ— π‘¨β€²βŸ©βŸ¨π‘¨β€² βŠ— πœπ‘¨, 𝑨 π‘žπ‘¨, 𝑨 π‘¨βŸ©βŸ¨π‘¨

  • ,

βŠ— π‘¨βŸ©βŸ¨π‘¨ βŠ— πœπ‘¨, 𝑨 πœ—β€² πœ—β€² πœ—β€²β€²

slide-31
SLIDE 31

Small imperfection

1 1 1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is πœ€, the protocol is πœ—β€secret. Bob tries to help resetting Alice’s qubits to 0 on X basis Aβ€² We want a theorem looking like

slide-32
SLIDE 32

Small imperfection

1 1 1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is πœ€, the protocol is 2πœ€β€secret. Bob tries to help resetting Alice’s qubits to 0 on X basis Aβ€² 2πœ€β€secret Failure πœ€

slide-33
SLIDE 33

Relation between failure probability and secrecy

1 1

𝜍

,

πœ€ failure: 𝜏

,

𝜏

,

  • βŸ¨πœ’
  • ||οΌ‹βŸ© ⟨
  • | |πœ’βŸ©

οΌ‹ 𝜍: Tr 𝜍

, Tr 𝜏 ,

1 πœ€ Tr ⟨

  • |

οΌ‹ 𝜏

,|οΌ‹βŸ©

𝜍 𝜏

,

Tr Tr |πœ’βŸ©

Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).

slide-34
SLIDE 34

Relation between failure probability and secrecy

1 1

𝜍

,

𝜏

,

𝜍 Tr𝜍

,

1 1

𝜍

,

𝜏

,

  • βŸ¨πœ’
  • ||οΌ‹βŸ© ⟨
  • | |πœ’βŸ©

οΌ‹ ⟨

  • |

οΌ‹ 𝜏

,|οΌ‹βŸ©

𝜍 𝜏

,

Tr Tr |πœ’βŸ© 𝜏

,

|οΌ‹βŸ© ⟨

  • |

οΌ‹ βŠ— 𝜍 |οΌ‹βŸ© |πœ’βŸ© Tr 𝜏

,

|Φ⟩ ≔ |οΌ‹βŸ© |πœ’βŸ© Tr 𝜏

,

|Ψ⟩ ≔ Ξ¦ Ξ¨

βŸ¨πœ’

  • ||οΌ‹βŸ©

⟨

  • ||πœ’βŸ©

οΌ‹

1 πœ€ 1 πœ€ Tr

Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).

slide-35
SLIDE 35

Relation between failure probability and secrecy

1 1

𝜍

,

𝜏

,

𝜍 Tr𝜍

,

1 1

𝜍

,

𝜏

,

𝜍 𝜏

,

Tr Tr |πœ’βŸ© 𝜏

,

|οΌ‹βŸ© ⟨

  • |

οΌ‹ βŠ— 𝜍 |οΌ‹βŸ© |πœ’βŸ© Tr 𝜏

,

|Φ⟩ ≔ |οΌ‹βŸ© |πœ’βŸ© Tr 𝜏

,

|Ψ⟩ ≔ Ξ¦ Ξ¨

βŸ¨πœ’

  • ||οΌ‹βŸ©

⟨

  • ||πœ’βŸ©

οΌ‹

1 πœ€ 𝐺𝜏

,, 𝜏 ,

Ξ¦ Ξ¨

1 πœ€ 1 2πœ€

1 2 𝜍

, 𝜍 ,

1 𝐺 2πœ€ 2πœ€ 2 πœ€ 2πœ€

Hayashi, Tsurumaru, New J. Phys., 14, 093014 (2012).

slide-36
SLIDE 36

Small imperfection

1 1 1 1

Bob tries to guess Alice’s final key If there is a promise that the failure probability is πœ€, the protocol is 2πœ€β€secret. Bob tries to help resetting Alice’s qubits to 0 on X basis Aβ€² 2πœ€β€secret Failure πœ€

slide-37
SLIDE 37

STEP 3: Practical world

slide-38
SLIDE 38

Small imperfection

1 1 1 1

Bob tries to guess Alice’s final key Bob tries to help resetting Alice’s qubits to 0 on X basis 2πœ€β€secret This scenario works if entanglement distillation is actually carried out. πœ—β€²β€²β€correct Failure πœ€

Lo, Chau, Science, 283, 2050 (1999).

slide-39
SLIDE 39

Realistic cases

1 1 1 1

Bob tries to guess Alice’s sifted key β‰… 1 Failure

1 1

Bob tries to help resetting Alice’s qubits to 0 on X basis insecure Bit errors Phase errors Sifted key (N bits)

slide-40
SLIDE 40

Realistic cases

1 1 1 1

Bob tries to guess Alice’s sifted key

1 1

Bob tries to help resetting Alice’s qubits to 0 on X basis A promise on statistical property

  • f phase errors

Sifted key (N bits) Privacy amplification Final key (K bits)

1

πœ—β€secret What we want: e.g. The number of phase errors 𝑂𝑓 except a small probability πœ€

slide-41
SLIDE 41

Realistic cases

1 1 1 1

Bob tries to guess Alice’s sifted key

1 1

Bob tries to help resetting Alice’s qubits to 0 on X basis A promise on statistical property

  • f phase errors

Sifted key (N bits) Privacy amplification Final key (K bits)

1

What we want: e.g. The number of phase errors 𝑂𝑓 except a small probability πœ€ 𝐼 bits πœ—β€secret In this talk, we assume that Alice helps Bob by sending 𝐼 bits of encrypted message, by consuming as many bits of secret key. The net key gain of the QKD protocol is 𝐻 𝐿 𝐼.

slide-42
SLIDE 42

Privacy amplification

Sifted key Privacy amplification Final key (Bob also applies the same procedure to his sifted key.) Final key (K bits) Sifted key (N bits)

1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1

A randomly chosen matrix N qubits

slide-43
SLIDE 43

Approach with leftover hashing lemma

Sifted key Privacy amplification Final key Final key (K bits) Sifted key (N bits)

1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1

A randomly chosen matrix N qubits Eve’s quantum system

Renner (2005)

𝐼

  • 𝐡 𝐹

Tsurumaru, IEEE Trans. Inf. Theory, 66, 3465 (2020).

Leftover hashing lemma Relations between the two approaches Bob’s quantum system

slide-44
SLIDE 44

Privacy amplification

Sifted key Privacy amplification Final key Final key (K bits) Sifted key (N bits)

1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1

A randomly chosen matrix N qubits

slide-45
SLIDE 45

Privacy amplification

Sifted key Privacy amplification Final key

1 1

1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Quantum circuit

(Z basis) N qubits Final key (K bits) K qubits

slide-46
SLIDE 46

Example: a controlled-NOT gate

  • n X basis
  • n Z basis

Matrix 𝐷 Matrix 𝐷

1 1 = 1 1 1 1

The same quantum circuit

1 1 = 1 1 1 1

slide-47
SLIDE 47

Privacy amplification

1 1

1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Quantum circuit

(Z basis) N qubits Final key (K bits) K qubits

slide-48
SLIDE 48

Privacy amplification

N qubits K qubits

1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Quantum circuit

(X basis)

1 1

e.g.

A promise on statistical property of phase error patterns π’šβˆ—

The number of phase errors 𝑂𝑓 except a small probability πœ€

2πœ€β€secret failure πœ€ Privacy amplification to K bits Phase error correction via (N-K) bits of hints On Z basis: On X basis: π’šβˆ—

slide-49
SLIDE 49

Number of possible phase error patterns (N‐bit string π’šβˆ—)

The number of phase errors 𝑂𝑓

Amount of privacy amplification (Rough)

N qubits K qubits

1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Quantum circuit

(X basis)

1 1

e.g.

2πœ€β€secret failure πœ€

2

𝐼 π‘‚β„Žπ‘“

β„Ž 𝑦 ≔ 𝑦log𝑦 1 𝑦 log1 𝑦

Every bit halves the number of candidates. Phase error correction will succeed if 𝐼 𝑂 𝐿 Secure final key length 𝐿 β‰… 𝑂 𝐼 π’šβˆ—

slide-50
SLIDE 50

One can choose a candidate set π‘ˆ of probable phase error patterns such that

Amount of privacy amplification (Strict)

N qubits K qubits

1 1 1 1 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Quantum circuit

(X basis)

1 1

2πœ€β€secret failure πœ€

|π‘ˆ| 2

π’šβˆ— Prob π’šβˆ— ∈ π‘ˆ 1 πœ€ Every wrong candidate in π‘ˆ is eliminated except probability 2 Choose the final key length 𝐿 as 𝐿 𝑂 𝐼 𝑑 failure πœ€ 2 π‘ˆ πœ€ 2 πœ€

slide-51
SLIDE 51

Finite-size security

1 1 1 1

Bob tries to guess Alice’s sifted key

1 1

Bob tries to help resetting Alice’s qubits to 0 on X basis Sifted key (N bits) Privacy amplification Final key (K bits)

1

𝜍

,

πœ—β€secret The protocol is

with πœ— 2 2 πœ€

|π‘ˆ| 2

Prob π’šβˆ— ∈ π‘ˆ 1 πœ€ 𝐿 𝑂 𝐼 𝑑 or 0 π’šβˆ—

slide-52
SLIDE 52

Recipe

1 1 1

Alice’s sifted key

1 1 1 1 1

Bob Eve Eve

?

  • 1. Rewrite the protocol such that Alice’s sifted key is the Z values of qubits.
  • 2. Find what Bob could have done to help reducing phase errors.

(It must be compatible to Bob’s announcement)

  • 3. Compute a bound on the number of phase error patterns.
slide-53
SLIDE 53

Remarks

β€˜Phase error probability’ or β€˜Phase error rate’ 𝑓 in the asymptotic limit Number of phase errors

𝑂𝑓 πœ€

  • except probability πœ€
  • πœ€

, πœ€ β†’ 0 for 𝑂 β†’ ∞

𝐼 π‘‚β„Žπ‘“ πœ€

  • 𝐿

𝑂 1 β„Ž 𝑓 πœ€

  • 𝑑

𝑂 β†’ 1 β„Ž 𝑓 Asymptotic efficiency of privacy amplification

slide-54
SLIDE 54

Remarks

1 1 1 1

Eve

?

Sifted key bits are tagged and classified: 𝑂 βˆ‘ 𝑂

  • Phase error probability 𝑓

depending on the tag value 𝑒

𝑒 0 𝑒 1 𝑒 0 𝑒 1 𝑒 0

𝑂 𝑂 β†’ 𝑅

Number of phase error patterns: ∼ ∏ 2^𝑂 β„Ž 𝑓

  • 𝐼 ∼ 𝑂 β„Ž 𝑓
  • 𝐿

𝑂 β†’ 1 𝑅 β„Ž 𝑓

  • Tagging

Gottesman, Lo, Lutkenhaus, Preskill, Quant. Inf. Comput. 5, 325 (2004).

slide-55
SLIDE 55

PART II: Protocols

slide-56
SLIDE 56

Ideal BB84 protocol

0101… Alice Bob Eve 1 1 1 Sifted key

Signal Test

+

1 2 1 2

=

Assumption: Detection probability has no dependence on the basis, for any input.

Signal Test

Announcement

  • f detection
slide-57
SLIDE 57

+

1 2 1 2

Ideal BB84 protocol

0101… Alice Bob Eve Sifted key

=

1

Signal Test

Assumption: Detection probability has no dependence on the basis, for any input.

Signal Test

Announcement

  • f detection
slide-58
SLIDE 58

Ideal BB84 protocol

Alice Bob Eve

+

1 2 1 2

= +

1 2 1 2

=

1

Signal Test

Assumption: Detection probability has no dependence on the basis, for any input.

Signal Test

Announcement

  • f detection
slide-59
SLIDE 59

Ideal BB84 protocol

1 1 1

Alice’s sifted key

1 1

Bob Eve Eve

?

slide-60
SLIDE 60

Ideal BB84 protocol

1 1 1

Alice’s sifted key

1 1 1 1 1

Bob Eve Eve

1 1

Eve

Test mode Signal mode

slide-61
SLIDE 61

Ideal BB84 protocol

Alice Bob Eve 1

Signal Test

Assumption: Detection probability has no dependence on the basis, for any input.

Signal Test

Fair sampling Errors found in the test mode are fair sampling of phase errors Asymptotic key length: 𝐿 ∼ 𝑂1 β„Ž 𝑓 Finite‐size: classical sampling theory is enough. Simple random sampling

A fixed number of samples drawn

Bernoulli sampling

Hypergeometric distribution Samples drawn with a fixed probability Binomial distribution

𝑄 𝑄 𝑄 𝑄 𝑄 𝑄 𝑄

Announcement

  • f detection

Kawakami, Sasaki, MK, Phys. Rev. A, 96, 012305 (2017).

slide-62
SLIDE 62

BB84 protocol with phase-randomized laser pulses

A 𝜍 π‘žπ‘œ π‘œβŸ©βŸ¨π‘œ

  • C

Alice emits a phase‐randomized pulse in a mode C π‘œ: number of photons 𝜍 π‘žπ‘œ π‘œβŸ©βŸ¨π‘œ π‘œβŸ©βŸ¨π‘œ

  • C

π‘œ

Tr𝜍 𝜍

  • β†’ 1 𝑅 β„Ž 𝑓

𝑅 β„Ž 𝑓 𝑅 β„Ž 𝑓

  • Asymptotic rate

1 𝑅 β„Ž 𝑓

𝑅

Tighter estimation of the parameters is done by decoy‐state technique.

Lo, arXiv:quant‐ph/0503004

slide-63
SLIDE 63

Binary phase encoding

Alice Bob Eve 1 1 1

Signal

=

Ο€ Ο€ Ο€ Ο€

+

1 2 1 2

= +

even

  • dd

Schrodinger cat states

| π›½βŸ© | π›½βŸ©

Coherent states

Used in many protocols: B92, DPS, RRPDS, a Twin-field(PM), a DM-CV, … c𝛽 𝑑𝛽

|π›½βŸ© |π›½βŸ©

c 𝛽 𝑑 𝛽 1 𝑑 𝛽 𝑓sinh 𝛽 𝛽 𝑃𝛽

Prob.of |γƒΌβŸ©, corresponding to the amount of information in the signal.

slide-64
SLIDE 64

B92 protocol

0101… Alice Bob Eve 1 1 1 Sifted key

Signal Test

Announcement

  • f detection

Ο€ Ο€ Ο€ Ο€ Ο€

| π›½βŸ© | π›½βŸ© 1 | π›ΎβŸ©βŸ¨π›Ύ| 2

Coherent states

1 |οΌ‹π›ΎβŸ©βŸ¨οΌ‹π›Ύ| 2

𝛾 ≔ πœƒπ›½

Nominal received amplitude

Outcome 0: Outcome 1:

1 failure

B92 Outcome β€˜failure’: c 𝛾 |π›ΎβŸ©π›Ύ| 𝑑 𝛾 |π›ΎβŸ©π›Ύ| input LO

|οΌ‹π›ΎβŸ© Photon detector

| π›ΎβŸ©

πœƒ: channel transmission

slide-65
SLIDE 65

B92 protocol

1 1 1

Alice’s sifted key

1 failure 1 1 1

Bob Eve Eve

?

B92 B92 B92 B92 B92

even even even

  • dd
  • dd

1 |π›ΎβŸ©

slide-66
SLIDE 66

B92 protocol: Analysis of phase error probability

Basis: |οΌ‹βŸ© |γƒΌβŸ© |π›ΎβŸ© |π›ΎβŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© Phase error No Phase error |γƒΌβŸ© |οΌ‹βŸ© |π›ΎβŸ© |π›ΎβŸ© |οΌ‹βŸ© |γƒΌβŸ©|π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© 1 |π›ΎβŸ© |π›ΎβŸ© |γƒΌβŸ© |οΌ‹βŸ©|π›ΎβŸ© Bit error:1/2 Bit error:1/2 Probability of

𝑑 𝛽 𝑑 𝛾 𝑑 𝛾 1 2

1 |γƒΌβŸ©

Tamaki, MK, Imoto, Phys. Rev. Lett., 90, 167904 (2003), MK, Phys. Rev. Lett., 93, 120501 (2004)

slide-67
SLIDE 67

B92 protocol: Analysis of phase error probability

Basis: |οΌ‹βŸ© |γƒΌβŸ© |π›ΎβŸ© |π›ΎβŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© Phase error No Phase error |γƒΌβŸ© |οΌ‹βŸ© |π›ΎβŸ© |π›ΎβŸ© |οΌ‹βŸ© |γƒΌβŸ©|π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© 1 |π›ΎβŸ© |π›ΎβŸ© |γƒΌβŸ© |οΌ‹βŸ©|π›ΎβŸ© Bit error:1/2 Bit error:1/2

𝑑 𝛽 𝑑 𝛾 𝑑 𝛾 1 2

If bit error prob. is zero …. Only the two states are allowed. The average must be the initial value 𝑑 𝛽 , since Eve cannot touch Alice’s qubit. Phase error probability is 𝑓 𝑑 𝛽 𝛾

  • (consistent with beam splitting attack)

1 Probability of |γƒΌβŸ©

MK, Phys. Rev. Lett., 93, 120501 (2004)

slide-68
SLIDE 68

B92 protocol: Analysis of phase error probability

Basis: |οΌ‹βŸ© |γƒΌβŸ© |π›ΎβŸ© |π›ΎβŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© Phase error No Phase error |γƒΌβŸ© |οΌ‹βŸ© |π›ΎβŸ© |π›ΎβŸ© |οΌ‹βŸ© |γƒΌβŸ©|π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© |π‘π‘’β„Žπ‘“π‘ π‘‘βŸ© 1 |π›ΎβŸ© |π›ΎβŸ© |γƒΌβŸ© |οΌ‹βŸ©|π›ΎβŸ© Bit error:1/2 Bit error:1/2

𝑑 𝛽 𝑑 𝛾 𝑑 𝛾 1 2

Given Bit error prob. Detection prob. Compute the worst phase error prob. 1 Asymptotic: Finite‐size: Azuma’s inequality Probability of |γƒΌβŸ©

slide-69
SLIDE 69

Twin-Field QKD

Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).

Untrusted (taken over by Eve)

Ο€

Only uses lasers, linear optics, and photon detectors.

slide-70
SLIDE 70

Expected key rate scaling in TF-QKD

Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).

It is expected that the achievable distance is doubled.

Pirandola, Laurenza, Ottaviani & Banchi., Nat.

  • Commun. 8, 15043 (2017).
slide-71
SLIDE 71

Twin-Field QKD

Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).

Alice Bob

  • cf. A prepare‐and‐measure QKD

Detection!

A photon travels only half the distance between Alice and Bob.

slide-72
SLIDE 72

Twin-Field QKD

Twin-Field protocol (Toshiba Europe) Lucamarini et al., Nature 557, 400 (2018).

Alice Bob Detection!

A photon travels only half the distance between Alice and Bob.

  • cf. A prepare‐and‐measure QKD
slide-73
SLIDE 73

Twin-Field-type QKD

0101… Alice Bob 1 1 1 Sifted key

Signal

Ο€ Ο€ Ο€

| π›½βŸ© | π›½βŸ©

β€œPhase‐Matching” protocol

Ma, Zeng & Zhou, Phys. Rev. X 8, 031043 (2018).

Announcement: Detected (in phase/out of phase) Failed Eve/ Charlie

Test mode: Many variants of PM protocols

Ο€ Ο€

slide-74
SLIDE 74

TF-type QKD (PM protocol)

1 1 1

Alice’s sifted key

1 1

Bob Eve/ Charlie

even even even

  • dd
  • dd
  • dd

even

  • dd

even even

1 1 1

Eve/ Charlie

1 1 1

(Only the detected rounds are shown) even even

  • dd
  • dd

results in a phase error. The cases with

slide-75
SLIDE 75

Alice Bob 1

Signal

Ο€

| π›½βŸ© | π›½βŸ©

Announcement: Detected (in phase/out of phase) Failed Eve/ Charlie

Test mode:

TF-type QKD (PM protocol)

even even

  • dd
  • dd

=

π‘Ÿ ≔ c 𝛽 c 𝛽 𝑑 𝛽 π‘Ÿ 1 π‘Ÿ |π›½βŸ© |π›½βŸ© |π›½βŸ© |π›½βŸ© Phase error probability Estimation of detection rate of (by only using coherent states) Asymptotic: Many designs proposed. Finite‐size: ・Reduction to Bernoulli sampling (Operation dominance method) ・(Improved version of) Azuma’s inequality

1) Maeda, Sasaki, MK, Nat. Commun. 10, 3140 (2019). 2) Lorenzo, Navarrete, Azuma, Curty, Razavi, arXiv:1910.11407. 3) Kato, arXiv:2002.04357. 1) 3) 2)

slide-76
SLIDE 76

Alice

Ο€ Ο€ Ο€

detection 1 2 3 4 5 6 1 2 3 4 5 6

𝑗, π‘˜ 3,5

1

…

VD

Bob Variable delay 1 1

𝑗, π‘˜ 3,5

1 1 βŠ• 0 1 Alice’s sifted key bit Bob’s sifted key bit

Ο€

| π›½βŸ© | π›½βŸ©

Block of 𝑀 pulses

Sasaki, Yamamoto, MK, Nature 509 509, 475 (2014).

Round Robin DPS QKD

slide-77
SLIDE 77

Security from complementarity

1 1

𝜍

,

1 1

Bob tries to guess Alice’s final key Bob tries to help resetting Alice’s qubits to 0 on X basis Erasing info on Alice’s final key Learning Alice’s final key Bob has a choice between a pair of mutually exclusive tasks

slide-78
SLIDE 78

What is the working principle of QKD?

Alice Bob Eve Law of quantum mechanics

Conventional QKD RRDPS QKD

Nothing to do with quantum Eve’s attempts to eavesdrop should leave a trace, which can be monitored. Alice Bob Eve Eve has only a small chance to read out the bit, just because the signal is weak. Law of quantum mechanics

slide-79
SLIDE 79

Round Robin DPS QKD

Alice

Ο€ Ο€ Ο€

detection 1 2 3 4 5 6 1 2 3 4 5 6

𝑗, π‘˜ 3,5

1

…

VD

Bob Variable delay 1 1

𝑗, π‘˜ 3,5

1 1 βŠ• 0 1 Alice’s sifted key bit Bob’s sifted key bit

Ο€

| π›½βŸ© | π›½βŸ©

Block of 𝑀 pulses

Sasaki, Yamamoto, MK, Nature 509 509, 475 (2014).

slide-80
SLIDE 80

RRDPS QKD

Alice

Ο€ Ο€ Ο€

1

…

VD

Bob Variable delay 1 1

𝑗, π‘˜ 3,5

1 1 βŠ• 0 1 Bob’s sifted key bit Block of 𝑀 pulses

Assumption: Total number of photons is no larger than πœ‰ 1 2 3 4 5 4 5 1 2 3

1 Assumption:

slide-81
SLIDE 81

RRDPS protocol

1 1 1

Alice’s sifted key

1 failure 1 1 1

Bob Eve Eve

?

βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀 βŠ— 𝑀

slide-82
SLIDE 82

RRDPS QKD

𝑗, π‘˜ 3,5 𝑀 pulses sifted key bit

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜ 1

1 2 3 4 5 detection 4 5 1 2 3

slide-83
SLIDE 83

RRDPS QKD

𝑀 pulses phase error

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜

1 1

1

1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than πœ‰

No more than πœ‰ qubits are in state 𝑗, π‘˜ 3,5

slide-84
SLIDE 84

RRDPS QKD

𝑀 pulses

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜

1 1

1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than πœ‰

No more than πœ‰ qubits are in state 𝑗, π‘˜ 3,5

detection

The index π‘˜ is uniformly random.

Probability of phase error

πœ‰ 𝑀 1 phase error

slide-85
SLIDE 85

RRDPS QKD

𝑀 pulses

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜

1 1

1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than πœ‰

No more than πœ‰ qubits are in state 𝑗, π‘˜ 3,5

detection

The index 𝑗 is uniformly random.

Probability of phase error

πœ‰ 𝑀 1 phase error

slide-86
SLIDE 86

RRDPS QKD

𝑀 pulses

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜

1 1

1 2 3 4 5 detection 4 5 1 2 3 Assumption: Total number of photons is no larger than πœ‰

No more than πœ‰ qubits are in state 𝑗, π‘˜ 3,5

detection

The index 𝑗 is uniformly random.

Probability of phase error

πœ‰ 𝑀 1 phase error

slide-87
SLIDE 87

RRDPS QKD

𝑀 pulses

βŠ— 𝑀 βŠ— 𝑀

𝑗 π‘˜

1 1

𝑗, π‘˜ 3,5

Probability of phase error

πœ‰ 𝑀 1 phase error Asymptotic key length: 𝐿 ∼ 𝑂 π‘‚β„Ž πœ‰ 𝑀 1 Finite‐size: No sampling needed. Just a Bernoulli trial.

slide-88
SLIDE 88

What is the working principle of QKD?

Alice Bob Eve Law of quantum mechanics

Conventional QKD RRDPS QKD

Nothing to do with quantum Eve’s attempts to eavesdrop should leave a trace, which can be monitored. Alice Bob Eve Eve has only a small chance to read out the bit, just because the signal is weak. Law of quantum mechanics

slide-89
SLIDE 89

CV-QKD

LASER

signal photodetector photodetector

γƒΌ

Homodyne/Heterodyne detection Continuous-variable QKD CV-QKD was off limits to the phase error approach.

slide-90
SLIDE 90

A two-state CV-QKD protocol

1

Signal Test

Ο€ Ο€

| π›½βŸ© | π›½βŸ©

Coherent states

1 | π›ΎβŸ©βŸ¨π›Ύ| 2 1 |οΌ‹π›ΎβŸ©βŸ¨οΌ‹π›Ύ| 2

𝛾 ≔ πœƒπ›½ Outcome 0: Outcome 1:

1 failure

B92 The B92 measurement has two roles. Signal: Selecting out only favorable events. 𝑦

Acceptance probability

1 β€œ0” β€œ1” β€œfailure”

Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.

slide-91
SLIDE 91

2-state CV protocol

1 1 1

Alice’s sifted key

1 failure 1 1 1

Bob Eve Eve

?

even even even

  • dd
  • dd
slide-92
SLIDE 92

2-state CV protocol

1 1 1

Alice’s sifted key

1 failure 1 1 1

Bob Eve Eve

even even even

  • dd
  • dd

e/o e/o e/o e/o e/o e/o Parity of the photon number

slide-93
SLIDE 93

A two-state CV-QKD protocol

1

Signal Test

Ο€ Ο€

| π›½βŸ© | π›½βŸ©

Coherent states

1 | π›ΎβŸ©βŸ¨π›Ύ| 2 1 |οΌ‹π›ΎβŸ©βŸ¨οΌ‹π›Ύ| 2

𝛾 ≔ πœƒπ›½ Outcome 0: Outcome 1:

1 failure

B92 The B92 measurement has two roles. Signal: Selecting out only favorable events. Test: Estimation of bit error probability βŸ¨οΌ‹π›Ύ|𝜍|οΌ‹π›ΎβŸ© Estimation of fidelities of the received state βŸ¨π›Ύ|𝜍| π›ΎβŸ©

Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.

slide-94
SLIDE 94

Fidelity estimation via Heterodyne measurement

Ξ›, 𝜈 ≔ 𝑓 1 𝑠 𝑀

1 𝑠 𝜈

Associated Laguerre polynomial

𝔽Λ, πœ• ⟨0|𝜍|0⟩

πœ• ∈ β„‚: Outcome of Heterodyne measurement 𝜍: input state The equality holds when 𝜍 has 𝑛 or fewer photons.

𝔽Λ, πœ• 𝛾 βŸ¨π›Ύ|𝜍| π›ΎβŸ©

𝑛: odd integer

Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.

slide-95
SLIDE 95

Ξ›, 𝜈 is bounded and smooth

Security proof of 2-state CV-QKD

βœ“ Finite-size security βœ“ Against general attack

(AzumaΚΌs inequality)

βœ“ Finite measurement precision βœ“ Finite constellation

Matsuura, Maeda Sasaki, MK, arXiv: 2006.04661.